MS08_067.py
I run it via the below and get nothing...no even traffic to the the target via tcpdump....
python ms08-067-40279.py 10.1.1.1 1
this is all i get:
MS08-067 Exploit
The return addresses and the ROP parts are ported from metasploit module exploit/windows/smb/ms08_067_netapi
I just corrected some indention error. Look like github does not keep my indentions properly. You should at least see "Windows XP SP0/SP1 Universal" comming out.
thanks. No longer getting those errors but also not getting any traffic either. i am hitting this ins a lab over a vpn, so the traffic should go over my tap0, but doing a tcpdump i see no taraffic. here is my command output:
python ms08-067-40279.py 10.1.1.1 1 #######################################################################
MS08-067 Exploit
The return addresses and the ROP parts are ported from metasploit module exploit/windows/smb/ms08_067_netapi
#######################################################################
I have a issue with it it is not working with SP2/SP3 which is exploited with msf but not with this file